Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
References
CCI
CCI-000795
CCI
CCI|CCI-000795
Title
The organization manages information system identifiers by disabling the identifier after an organization-defined time period of inactivity.
Reference Item Details
Reference:
CCI - DISA Control Correlation Identifier
Category:
2024
Audit Items
View all Reference Audit Items
Name
Plugin
Audit Name
4.019 - Outdated or unused accounts must be removed from the system.
Windows
DISA Windows Vista STIG v6r41
5.5.1.9 Ensure inactive password lock is 0 days - individuals, groups, roles, and devices if the password expires.
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
Big Sur - Disable Accounts after 35 Days of Inactivity
Unix
NIST macOS Big Sur v1.4.0 - 800-53r5 Moderate
Big Sur - Disable Accounts after 35 Days of Inactivity
Unix
NIST macOS Big Sur v1.4.0 - 800-171
Big Sur - Disable Accounts after 35 Days of Inactivity
Unix
NIST macOS Big Sur v1.4.0 - All Profiles
Big Sur - Disable Accounts after 35 Days of Inactivity
Unix
NIST macOS Big Sur v1.4.0 - CNSSI 1253
Big Sur - Disable Accounts after 35 Days of Inactivity
Unix
NIST macOS Big Sur v1.4.0 - 800-53r4 Moderate
Big Sur - Disable Accounts after 35 Days of Inactivity
Unix
NIST macOS Big Sur v1.4.0 - 800-53r4 High
Big Sur - Disable Accounts after 35 Days of Inactivity
Unix
NIST macOS Big Sur v1.4.0 - 800-53r4 Low
Big Sur - Disable Accounts after 35 Days of Inactivity
Unix
NIST macOS Big Sur v1.4.0 - 800-53r5 High
Catalina - Disable Accounts after 35 Days of Inactivity
Unix
NIST macOS Catalina v1.5.0 - 800-171
Catalina - Disable Accounts after 35 Days of Inactivity
Unix
NIST macOS Catalina v1.5.0 - All Profiles
Catalina - Disable Accounts after 35 Days of Inactivity
Unix
NIST macOS Catalina v1.5.0 - 800-53r5 High
Catalina - Disable Accounts after 35 Days of Inactivity
Unix
NIST macOS Catalina v1.5.0 - CNSSI 1253
Catalina - Disable Accounts after 35 Days of Inactivity
Unix
NIST macOS Catalina v1.5.0 - 800-53r4 High
Catalina - Disable Accounts after 35 Days of Inactivity
Unix
NIST macOS Catalina v1.5.0 - 800-53r4 Moderate
Catalina - Disable Accounts after 35 Days of Inactivity
Unix
NIST macOS Catalina v1.5.0 - 800-53r4 Low
Catalina - Disable Accounts after 35 Days of Inactivity
Unix
NIST macOS Catalina v1.5.0 - 800-53r5 Moderate
GEN000760 - Accounts must be locked upon 35 days of inactivity.
Unix
DISA STIG for Oracle Linux 5 v2r1
GEN006660 - Accounts must be locked upon 35 days of inactivity.
Unix
DISA STIG for Oracle Linux 5 v2r1
JBOS-AS-000290 - JBoss management Interfaces must be integrated with a centralized authentication mechanism that is configured to manage accounts according to DoD policy.
Unix
DISA RedHat JBoss EAP 6.3 STIG v2r4
Monterey - Disable Accounts after 35 Days of Inactivity
Unix
NIST macOS Monterey v1.0.0 - 800-171
Monterey - Disable Accounts after 35 Days of Inactivity
Unix
NIST macOS Monterey v1.0.0 - 800-53r4 Low
Monterey - Disable Accounts after 35 Days of Inactivity
Unix
NIST macOS Monterey v1.0.0 - CNSSI 1253
Monterey - Disable Accounts after 35 Days of Inactivity
Unix
NIST macOS Monterey v1.0.0 - All Profiles
Monterey - Disable Accounts after 35 Days of Inactivity
Unix
NIST macOS Monterey v1.0.0 - 800-53r4 High
Monterey - Disable Accounts after 35 Days of Inactivity
Unix
NIST macOS Monterey v1.0.0 - 800-53r5 High
Monterey - Disable Accounts after 35 Days of Inactivity
Unix
NIST macOS Monterey v1.0.0 - 800-53r5 Moderate
Monterey - Disable Accounts after 35 Days of Inactivity
Unix
NIST macOS Monterey v1.0.0 - 800-53r4 Moderate
OL6-00-000335 - The operating system must manage information system identifiers for users and devices by disabling the user identifier after an organization defined time period of inactivity.
Unix
DISA STIG Oracle Linux 6 v2r7
OL07-00-010310 - The Oracle Linux operating system must disable account identifiers (individuals, groups, roles, and devices) if the password expires - individuals, groups, roles, and devices if the password expires.
Unix
DISA Oracle Linux 7 STIG v2r14
PHTN-30-000035 - The Photon operating system must disable new accounts immediately upon password expiration.
Unix
DISA STIG VMware vSphere 7.0 Photon OS v1r3
PHTN-67-000036 - The Photon operating system must disable new accounts immediately upon password expiration.
Unix
DISA STIG VMware vSphere 6.7 Photon OS v1r6
RHEL-06-000335 - The operating system must manage information system identifiers for users and devices by disabling the user identifier after an organization defined time period of inactivity.
Unix
DISA Red Hat Enterprise Linux 6 STIG v2r2
RHEL-07-010310 - The Red Hat Enterprise Linux operating system must disable account identifiers (individuals, groups, roles, and devices) if the password expires.
Unix
DISA Red Hat Enterprise Linux 7 STIG v3r15
RHEL-08-020260 - RHEL 8 account identifiers (individuals, groups, roles, and devices) must be disabled after 35 days of inactivity.
Unix
DISA Red Hat Enterprise Linux 8 STIG v2r1
RHEL-09-411050 - RHEL 9 must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.
Unix
DISA Red Hat Enterprise Linux 9 STIG v2r2
SLES-12-010340 - The SUSE operating system must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity after password expiration.
Unix
DISA SLES 12 STIG v2r13
UBTU-16-010280 - Account identifiers (individuals, groups, roles, and devices) must disabled after 35 days of inactivity.
Unix
DISA STIG Ubuntu 16.04 LTS v2r3
UBTU-18-010445 - The Ubuntu operating system must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.
Unix
DISA STIG Ubuntu 18.04 LTS v2r15
UBTU-20-010409 - The Ubuntu operating system must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.
Unix
DISA STIG Ubuntu 20.04 LTS v2r1
UBTU-22-411035 - Ubuntu 22.04 LTS must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.
Unix
DISA STIG Canonical Ubuntu 22.04 LTS v2r2
VCSA-70-000059 - The vCenter Server must uniquely identify and authenticate users or processes acting on behalf of users.
VMware
DISA STIG VMware vSphere 7.0 vCenter v1r3
WN10-00-000065 - Unused accounts must be disabled or removed from the system after 35 days of inactivity.
Windows
DISA Windows 10 STIG v3r2
WN11-00-000065 - Unused accounts must be disabled or removed from the system after 35 days of inactivity.
Windows
DISA Windows 11 STIG v2r2
WN12-GE-000014 - Outdated or unused accounts must be removed from the system or disabled.
Windows
DISA Windows Server 2012 and 2012 R2 DC STIG v3r7
WN12-GE-000014 - Outdated or unused accounts must be removed from the system or disabled.
Windows
DISA Windows Server 2012 and 2012 R2 MS STIG v3r7
WN16-00-000210 - Outdated or unused accounts must be removed from the system or disabled.
Windows
DISA Windows Server 2016 STIG v2r9
WN19-00-000190 - Windows Server 2019 outdated or unused accounts must be removed or disabled.
Windows
DISA Windows Server 2019 STIG v3r2
WN22-00-000190 - Windows Server 2022 outdated or unused accounts must be removed or disabled.
Windows
DISA Windows Server 2022 STIG v2r2